International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Review on Various Submerged Image Enhancement TechniquesS.KARTHIK, B.REUBEN, V.ANNAPOORANI2 |
6 | |
2 | Content Based Image Retrieval using the Hybrid Method of SURF, SVM and BAYESIAN with Color Histogram ProcessingMIR TAWSEEF MUSHTAQ, PROFESSOR RUPALI ZAKHMI3 |
25 | |
3 | Harvester and Collector Bot Based Harvesting SystemSRIDHATTA JAYARAM AITHAL4 |
6 | |
4 | Ensemble Methodology Approach for Improving Anomaly Detection AccuracyANUJA SAWANT5 |
2 | |
5 | A Survey on Data Mining Techniques in Social Network DataT.SURESHKUMAR, G.VADIVEL6 |
7 | |
6 | Vehicle Identification Number (VIN)– A SurveySANJYOT KAJALE7 |
6 | |
7 | A Proposed Method to Personalize and Extract the Hidden Knowledge Through Web Usage Mining and Pattern DiscoveryRUCHIKA KALAL, MANISH TIWARI8 |
2 | |
8 | A Proposed Method to Personalize and Extract the Hidden Knowledge Through Web Usage Mining and Pattern Discovery Using Web Usage Mining and Pattern RecoveryRUCHIKA KALAL, MANISH TIWARI9 |
1 | |
9 | Secure Text/Image Data Communication by Image Steganography into Video Sample using Wavelet TechniqueA.SRIVIDYA, SWATI VERMA10 |
1 | |
10 | Deep Learning Approach for Text Generation Using RNN Encoder-Decoder for Q&AJIVAN Y. PATIL11 |
3 | |
11 | A Survey on Industrial Control System attacks and preventive measuresAMRUTHA MOHANDAS, CHINJU K12 |
4 | |
12 | Remote Process Automation of Ticketing Using OtrsN.SAI SUSMITHA NAIDU, D.VENKATA SUBBAIAH13 |
6 | |
13 | Methodology for Gender Identification and Age Recognition through Multiple Indian Language Speech SignalMANISHA, VINAY JAIN14 |
1 | |
14 | Challenges in Active StoragePRITEE HULULE15 |
1 | |
15 | Review on Challenges in Various Storage Architectures in Cloud ComputingAMRUTA MAGDUM16 |
2 | |
16 | Detection of Malware Using Machine Learning AlgorithmsVRUSHAL R PATIL, SHITAL JADHAV17 |
2 | |
17 | Bottom-up Approach for Performance Testing of Software Applications or ProductsMOHAMMED ABDUL RAZACK MANIYAR, MOHD ABDUL HAKEEM, DR. MOHD KHALID MUBASHIRUZ ZAFAR18 |
2 | |
18 | Gaining Intuition of SSL / TLS Protocol Version 1.2 for Building LibrariesAISHWARYA RADHAKRISHNAN19 |
1 | |
19 | Searching the Hyperparameter Space for Tuning of Neural NetworksAISHWARYA RADHAKRISHNAN20 |
2 | |
20 | TILT OR TOUCH? AN EVALUATION OF STEERING CONTROL OF RACING GAME ON TABLET OR SMARTPHONEMUHAMMAD SUHAIB21 |
1 | |
21 | VANET Based Message Authentication on Data Analysis for Avoiding Road AccidentPRIYANKA DAWANE, K.S.INGLE22 |
1 | |
22 | Big Data Analytics Using Support Vector Machine AlgorithmDR.T.GEETHA, R.KARTHIKEYAN, B.ANITHA, M.ARUNA, R.DEEPIKA23 |
2 | |
23 | An Internet of Things Using Automatic Detection with Wireless Sensor NetworkR.KARTHIKEYAN, A.JEEVA, G.SOWNDARYA, P.POORANI, K.SANGAVI24 |
4 | |
24 | Survey on Global Access of User's Information Stored on the Cloud with the Help of FingerprintHAARIS MOTA, GUFARAN MUJAWAR, S. RAZA JOHAR, PROF. SONALI PATIL25 |
2 | |
25 | A Review on Advertisement View ability Prediction on the Web portalsV.MALARKKODI, S.SHENBAGAVADIVU26 |
2 | |
26 | A Survey on Fog Computing and Its SecurityNEETHUMOL KUMAR, ANANDHU PAVITHRAN27 |
2 | |
27 | A Survey Paper on Data Mining TechniquesPROF. S.P VANJARI, RUTUJA BURATE, GAYATRI KESKAR, PRIYA DHANURE, SADANAND GADVE28 |
1 | |
28 | Auto Accident Detection and Alert SystemHAFIZA MAHRUKH SHAHZADI, HAFIZA MARIA RAFIQUE, SHAZIA RIAZ29 |
5 | |
29 | A Survey on Smart Street Using Solar and IOT based Light ManagementSHAIKH NAVED, SHAIKH ABUZAR, KHAN SAKIR, KAMBLE J.R30 |
1 | |
30 | Survey Paper: Modern Logistics Vehicle System Using Tracking and SecuritySAIKRISHNA PAMU, RAJEEV MEWATI, AKANKSHA DUBEY, TUSHAR BABAR, KAILAS KARNEKAR32 |
4 | |
31 | An Advanced Approach of Text Mining for Analysis of Road AccidentsDISHA JAIN, SITANSHU JAIN33 |
2 | |
32 | Cryptocurrency Mining using Amazon Web ServicesASHKA ALKESHKUMAR SONI34 |
1 | |
33 | Smart Bowling Action Monitoring System Using WSNS.NAVEENA, A.S.RENUGADEVI, DR.L.MALATHI35 |
1 | |
34 | A Survey Paper on Cloud Security IssuesANJANI KUSHWAHA, PROF. DEEPAK AGRAWAL, PROF. AKSHAT KHASKALAM35A |
2 | |
35 | Topology Based Random Key Predistribution for Energy Saving in Wireless Sensor NetworkDR.K.SELVARAJ, P.JAYANTHI36 |
1 | |
36 | Composite Ratio Environment Based Re-Configurability Video Streaming 4g TechnologiesDR.K.SELVARAJ, R.RAJKUMAR37 |
1 | |
37 | A Survey Paper on Smart Library SystemVAISHNAVI GHODAKE, SWAPNALI CHAVAN, MRUNAL GAIKWAD,PROF. SHITAL BACHPALLE38 |
2 | |
38 | Analysis on Transport Layer Protocols and Its DevelopmentsKETULKUMAR GOVINDBHAI CHAUDHARI38A |
1 | |
39 | A Mapreducing Based on Skytree and SVM Classification for Big Data Using Hadoop EnvironmentDR.K.SELVARAJ, N.GEETHA39 |
1 | |
40 | Survey on Visually Impaired Assistance using Android Mobile (OCR)SHAIKH REHAN, ABRAR INAMDAR, KHALID HUSAIN, PROF. PRERANA DEOKAR40 |
1 | |
41 | Survey on Image Security in Social Media using Digital Watermarking with Embedded MetadataBILAL SAYYAD, MUBARAK SACHE, VASEEMAKRAM SAYYED, PROF. SONALI PATIL41 |
2 | |
42 | Pothole Detection System Based on Android Device and Ultrasonic SensorASHWINI KHARDE, PROF. KORE K. S, AKSHADA KOLHE, ASHWINI MUTHAL42 |
1 | |
43 | Identity Based Cloud Storage Security SystemSHAIKH NIKKHATPARVIN, KARISHMA MANIYAR, SNEHAL TAWHARE, PROF. GHOLAP P. S43 |
1 | |
44 | Performance Analysis of Video Steganography TechniquesSHREE RAKSHA44 |
2 | |
45 |
Numerical Methods for Solving Differential EquationsDr. Anurag Singh45 |
2 |